Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 18:59
Static task
static1
Behavioral task
behavioral1
Sample
bcccec78cfc1a43e998fb318df2a3043_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bcccec78cfc1a43e998fb318df2a3043_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bcccec78cfc1a43e998fb318df2a3043_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
bcccec78cfc1a43e998fb318df2a3043
-
SHA1
7b2f07507da3191b5b6feabe82b2feca3a38bb37
-
SHA256
870489ab9d127826e36919978c7fd80ca85dffd955562e6e38b095234445082f
-
SHA512
18ba5362ea0bc605f6fe4629619d0848afeb22eb7424ace28285e8ac3e0ede172571e923ca9e8f3bf103ef235b452f0ae6952500150fff502b4ae213d5eddf4f
-
SSDEEP
24576:iFszWS5ZfmLljbzQnDB+7BssNW5oIrqQFWrVMwNOiBxouj9D3:iW0lDKDB+7BsQKqyWrVMwXqU1
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x00090000000235b6-6.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation bcccec78cfc1a43e998fb318df2a3043_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1036 msets.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ctmfom = "C:\\Users\\Admin\\AppData\\Local\\Temp\\msets.exe" msets.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msets.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bcccec78cfc1a43e998fb318df2a3043_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe 1036 msets.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1036 msets.exe 1036 msets.exe 1036 msets.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3672 wrote to memory of 1036 3672 bcccec78cfc1a43e998fb318df2a3043_JaffaCakes118.exe 94 PID 3672 wrote to memory of 1036 3672 bcccec78cfc1a43e998fb318df2a3043_JaffaCakes118.exe 94 PID 3672 wrote to memory of 1036 3672 bcccec78cfc1a43e998fb318df2a3043_JaffaCakes118.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcccec78cfc1a43e998fb318df2a3043_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bcccec78cfc1a43e998fb318df2a3043_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\msets.exe"C:\Users\Admin\AppData\Local\Temp\msets.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1036,i,4356837537417149674,16553092232944545509,262144 --variations-seed-version --mojo-platform-channel-handle=4100 /prefetch:81⤵PID:4228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
762KB
MD50aeab8f910dda47a3aed6652f9a1cfdf
SHA15b8024fdb3e7187f8253f41f7be479356b655ab5
SHA256805a756c8dc926ad37d27282a3abb595fe6ca7e51354e956489944e9396fed65
SHA5129e3d7c30a23f04a05d4f52bfbd7832bbeaed37db2b236486953aa50d37642c11fc59938a46ecf8b9467f950d281ea5fc848ef70a4fb223698fcb9b06ba14b2b0